Monday, May 6th, 2013
Trojans continue to dominate the threat landscape, according to Panda Security's latest quarterly report, released Monday.
The anti-virus maker's research arm, PandaLabs, found that between January and March of this year, more than 6.5 million new malware strains were built, with trojans comprising 75 percent of those. In total, trojans were ...
Posted in Internet, Security, Software | No Comments
Monday, April 29th, 2013
Ongoing exploits infecting tens of thousands of reputable sites running the Apache Web server have only grown more powerful and stealthy since Ars first reported on them four weeks ago. Researchers have now documented highly sophisticated features that make these exploits invisible without the use of special forensic detection methods.
Linux/Cdorked.A, as ...
Posted in Internet, Linux, Security | No Comments
Sunday, April 28th, 2013
VirusTotal is a greedy creature, one of its gluttonous wishes is to be able to understand and characterize all the races it encounters, it already understood the insurgent collective of Portable Executables, the greenish creatures known as Android APKs, the talkative PDF civilization, etc. as of today it also figures ...
Posted in Internet, Privacy, Security, Software | No Comments
Saturday, April 20th, 2013
Security firm Lookout has detailed a clever new bit of Android Malware lurking in the Google Play store. The good news: unless you’re downloading questionable Russian clone apps, you’re probably not affected. The bad news: that hasn’t kept it from being downloaded a few million times.
The new malware, fittingly dubbed “BadNews”, has ...
Posted in Internet, Privacy, Security, Software | No Comments
Friday, June 22nd, 2012
A big amount of the malware out there are RAT (Remote administration tool) samples. This is software created by people specialized on it, people that develop, improve and sell their tools. It has capabilities that let the attacker spy on the victims with actions like screen capturing, keylogging, password stealing, ...
Posted in Internet, Security | No Comments